Back to news

March 23, 2022 | International, Aerospace

Thales remporte avec CS Group un appel d'offres de la DGA pour la lutte anti-drones

D'après Les Echos, la Direction générale de l'armement (DGA) a sélectionné l'offre de CS Group associé à Thales pour équiper la France d'une lutte anti-drones performante à l'horizon des Jeux Olympiques de Paris 2024. Selon son appel d'offres, le ministère des Armées envisage de consacrer un budget de 350 M€ sur dix ans à la lutte anti-drones.

Les Echos du 22 mars

On the same subject

  • Stealthy UAS Unveiled For USAF Target, Loyal Wingman Needs

    January 14, 2020 | International, Aerospace

    Stealthy UAS Unveiled For USAF Target, Loyal Wingman Needs

    Steve Trimble A small start-up company in California has unveiled a new proposal for a stealthy unmanned aircraft system (UAS) to offer the U.S. Air Force as a “fifth-generation” target drone or a low-cost attritable aircraft. Tehachapi, California-based Sierra Technical Services, a company founded by previously retired Lockheed Martin Skunk Works engineers, unveiled the first photos of the completed Fifth Generation Aerial Target (5GAT) prototype after completing engine tests on the ground. A first flight of the 5GAT is scheduled in early 2020. The name of the aircraft is derived from its origins as a prototype funded by the Defense Department's Director of Operational Test and Evaluation (DOT&E), says Roger Hayes, president and CEO of Sierra Technical Services. Several years ago, DOT&E recognized an emerging gap for a new target drone that could fly as a surrogate for fifth-generation fighters emerging in Russia and China such as the Sukhoi Su-57 and AVIC Chengdu J-20. In 2017, DOT&E awarded Sierra Technical Services a $15.9 million contract to develop the 5GAT prototype, Hayes said. The pace of assembly has been dictated by the availability of parts cannibalized from other military aircraft, such as the engines and metallic components from the Northrop T-38 trainer and F-5 fighter, as well as aileron actuators from the Boeing F/A-18, Hayes said. Sierra Technical Services supplemented its revenue as assembly continued by working on other programs, including supplying components for the Kratos XQ-58A Valkyrie. As development continued, the Air Force started to develop interest in a fifth-generation target. The service has awarded Lockheed Martin a contract to develop the AIM-260 Joint Advanced Tactical Missile, which is being designed to counter the PL-15 missile fielded on China's J-20 fighter. The Air Force needs to test the AIM-260 and other missiles against a representative threat. Last May, the Air Force released a request for information for the Next Generation Aerial Target, which included a version that can replicate fifth-generation fighter attributes, such as a stealthy airframe with canted tails and serpentine inlet ducts. The Air Force also is developing a concept to pair manned fighters such as the F-22 and F-35 with an unmanned partner, known sometimes as a Loyal Wingman. The Air Force Research Laboratory (AFRL) funded Kratos' XQ-58A, which completed a first flight in March. AFRL also plans to demonstrate a UAS controlled by a “software brain” using artificial intelligence. This Skyborg program is sometimes considered a follow-on for the XQ-58A program, but Hayes said Sierra Technical Services could offer the 5GAT for the Skyborg contract. https://aviationweek.com/special-topics/combat-aircraft/stealthy-uas-unveiled-usaf-target-loyal-wingman-needs

  • BAE Systems to supply US Army with jam-resistant navigation tech

    October 1, 2023 | International, Aerospace

    BAE Systems to supply US Army with jam-resistant navigation tech

    The cards were previously procured through “external contracts" that complicated acquisition, according to PEO IEW&S.

  • DoD IG: Military networks are exposed to ‘unnecessary’ cyber risks

    December 19, 2018 | International, C4ISR

    DoD IG: Military networks are exposed to ‘unnecessary’ cyber risks

    By: Mark Pomerleau The military services are exposing networks to “unnecessary cybersecurity risks” thanks in part to a lack of visibility over software application inventories, according to a Department of Defense Inspector General report. The IG investigated whether DoD components rationalized their software applications by identifying and eliminating any duplicative or obsolete applications. Rationalizing software applications seeks to improve enterprise IT by identifying all software applications on the network; determining if existing applications are needed, duplicative or obsolete; and determining if applications already existing within the network prior to purchasing new ones. The audit — which focused on Marine Corps, Navy and Air Force commands and divisions — found that the groups examined did not consistently perform this rationalization process. By not having visibility into software application inventories, these organizations were unable to identify the extent of existing vulnerabilities within their applications, the report found. Moreover, such a process could lead to cost savings associated with eliminating duplicative and obsolete applications. Fleet Forces Command was the only command the IG reviewed that had a process in place for eliminating duplicative or obsolete applications. The Air Force did not have a process in place to prevent duplication when purchasing new applications. The report placed blame on the DoD chief information officer for not implementing a solution for software rationalization in response to Federal Information Technology Acquisition Reform Act requirements. The IG made three recommendations for the CIO, who did not provide a response to draft recommendations: Develop an enterprisewide process for conduction software application rationalization throughout DoD; Establish guidance requiring DoD components to conduct rationalization and require DoD component CIOs to develop implementation guidance outlining responsibilities for rationalization. Such a policy should also require components on at least an annual basis to validate the accuracy of their owned and in use software applications inventory; and Conduct periodic review to ensure components are regularly validating the accuracy of their inventory and they are eliminating duplicative and obsolete applications. https://www.fifthdomain.com/dod/2018/12/18/dod-ig-military-networks-are-exposed-to-unnecessary-cyber-risks

All news